Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036
Cover for Cybercrime Investigators Handbook

Cybercrime Investigators Handbook

6 Bedømmelse

2.3

Varighed
11T 9M
Sprog
Engelsk
Format
Kategori

Økonomi & Business

Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks. They can cause immense harm to individuals or businesses online and make large sums of money—safe in the knowledge that the victim will rarely report the matter to the police. For those tasked with probing such crimes in the field, information on investigative methodology is scarce.

While there are high-quality manuals for conducting digital examinations on a device or network that has been hacked, the Cybercrime Investigators Handbook is the first guide on how to commence an investigation from the location the offence occurred and collect the evidence necessary to locate and prosecute the offender. This valuable contribution to the field teaches listeners to locate, lawfully seize, preserve, examine, interpret, and manage the technical evidence that is vital for effective cybercrime investigation.

© 2019 Ascent Audio (Lydbog): 9781469075211

Udgivelsesdato

Lydbog: 8. oktober 2019

Andre kan også lide...

  1. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
    The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  2. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
    GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
  3. Industry of Anonymity: Inside the Business of Cybercrime
    Industry of Anonymity: Inside the Business of Cybercrime Jonathan Lusthaus
  4. 3D Printing
    3D Printing John M. Jordan
  5. Chain Blame: How Wall Street Caused the Mortgage and Credit Crisis
    Chain Blame: How Wall Street Caused the Mortgage and Credit Crisis Padilla Muolo
  6. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  7. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  8. Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage
    Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage Eamon Javers
  9. The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe
    The Doomsday Calculation: How an Equation that Predicts the Future Is Transforming Everything We Know About Life and the Universe William Poundstone
  10. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
    Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  11. How Great Generals Win
    How Great Generals Win Bevin Alexander
  12. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  13. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
    Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  14. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  15. Joint Force Leadership: How SEALs and Fighter Pilots Lead to Success
    Joint Force Leadership: How SEALs and Fighter Pilots Lead to Success Mark Wayne McGinnis
  16. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
    Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  17. Gaming the Game: The Story Behind the NBA Betting Scandal and the Gambler Who Made It Happen
    Gaming the Game: The Story Behind the NBA Betting Scandal and the Gambler Who Made It Happen Sean Patrick Griffin
  18. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test
    Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
  19. The Great Persuasion: Reinventing Free Markets Since the Depression
    The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
  20. Survival: Tips, Tactics, and Tricks to Stay Alive Longer
    Survival: Tips, Tactics, and Tricks to Stay Alive Longer Jordan Gunner
  21. Breached!: Why Data Security Law Fails and How to Improve It
    Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove
  22. Certified Information Security Manager CISM Study Guide
    Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  23. Exploding Data: Reclaiming Our Cyber Security in the Digital Age
    Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  24. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
    Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  25. The Vanishing American Corporation: Navigating the Hazards of a New Economy
    The Vanishing American Corporation: Navigating the Hazards of a New Economy Gerald F. Davis
  26. Digital Resilience: Is Your Company Ready for the Next Cyber Threat?
    Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  27. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  28. Fake Photos
    Fake Photos Hany Farid
  29. The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World
    The End of Cheap China: Economic and Cultural Trends That Will Disrupt the World Shaun Rein
  30. The OSS and CIA: The History of America’s Intelligence Community during World War II and the Establishment of the Central Intelligence Agency
    The OSS and CIA: The History of America’s Intelligence Community during World War II and the Establishment of the Central Intelligence Agency Charles River Editors
  31. Billionaires in World Politics
    Billionaires in World Politics Peter Hagel
  32. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  33. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
    8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  34. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  35. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
    The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
  36. The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power
    The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power Joseph Turow
  37. Salt Wars: The Battle Over the Biggest Killer in the American Diet
    Salt Wars: The Battle Over the Biggest Killer in the American Diet Michael F. Jacobson
  38. Completing Capitalism: Heal Business to Heal the World
    Completing Capitalism: Heal Business to Heal the World Bruno Roche
  39. Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
    Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News Clint Watts
  40. Ludicrous: The Unvarnished Story of Tesla Motors
    Ludicrous: The Unvarnished Story of Tesla Motors Edward Niedermeyer
  41. Consent and Control in the Authoritarian Workplace: Russia and China Compared
    Consent and Control in the Authoritarian Workplace: Russia and China Compared Martin Krzywdzinski
  42. Taming the Risk Hurricane: Preparing for Major Business Disruption
    Taming the Risk Hurricane: Preparing for Major Business Disruption David Hillson
  43. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  44. You Can't Order Change: Lessons from Jim McNerney's Turnaround at Boeing
    You Can't Order Change: Lessons from Jim McNerney's Turnaround at Boeing Peter S. Cohan
  45. The Art of Attack: Attacker Mindset for Security Professionals
    The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
  46. The Great Depression: The Causes of the 1930s Economic Crices, and the Consequences on Society and Culture
    The Great Depression: The Causes of the 1930s Economic Crices, and the Consequences on Society and Culture History Retold
  47. Creating the KGB and CIA: The Establishment of the World’s Most Famous Intelligence Agencies
    Creating the KGB and CIA: The Establishment of the World’s Most Famous Intelligence Agencies Charles River Editors
  48. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST
    Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
  49. The Four Trials of Henry Ford: And His Pursuit of the Dark Fruit of Narcissism
    The Four Trials of Henry Ford: And His Pursuit of the Dark Fruit of Narcissism Gregory R. Piché
  50. Management Divided: Contradictions of Labor Management
    Management Divided: Contradictions of Labor Management Matt Vidal
  51. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies
    CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  52. The Bombardier Story: From Snowmobiles to Global Transportation Powerhouse
    The Bombardier Story: From Snowmobiles to Global Transportation Powerhouse Larry MacDonald
  53. The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production
    The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production Vinnie Mirchandani
  54. The Modern CIA: The History of America’s Central Intelligence Agency from the Cold War to Today
    The Modern CIA: The History of America’s Central Intelligence Agency from the Cold War to Today Charles River Editors
  55. Cybercrime and the Darknet: Revealing the hidden underworld of the internet
    Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  56. Imitation Democracy: The Development of Russia's Post-Soviet Political System
    Imitation Democracy: The Development of Russia's Post-Soviet Political System Dmitrii Furman
  57. Web3: Charting the Internet's Next Economic and Cultural Frontier
    Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
  58. How Do You Kill 11 Million People?: Why the Truth Matters More Than You Think
    How Do You Kill 11 Million People?: Why the Truth Matters More Than You Think Andy Andrews
  59. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
    Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  60. Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World
    Catching Lightning in a Bottle: How Merrill Lynch Revolutionized the Financial World Winthrop H. Smith
  61. Military Strategies and Tactics
    Military Strategies and Tactics Introbooks Team
  62. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
    The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  63. Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China
    Chinese Rules: Mao's Dog, Deng's Cat, and Five Timeless Lessons from the Front Lines in China Tim Clissold
  64. Trickle Up Poverty: Stopping Obama's Attack on Our Borders, Economy, and Security
    Trickle Up Poverty: Stopping Obama's Attack on Our Borders, Economy, and Security Michael Savage
  65. Waves
    Waves Fredric Raichlen
  66. Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity
    Counter-Intelligence: What the Secret World Can Teach Us About Problem-solving and Creativity Robert Hannigan
  67. Edge of Armageddon: The Imminent Nuclear Consequence
    Edge of Armageddon: The Imminent Nuclear Consequence Robert Enochs
  68. What Makes a Terrorist?: Economics and the Roots of Terrorism (10th Anniversary Edition)
    What Makes a Terrorist?: Economics and the Roots of Terrorism (10th Anniversary Edition) Alan B. Krueger
  69. Inside Rupert's Brain: How the World's Most Powerful Media Mogul Really Thinks
    Inside Rupert's Brain: How the World's Most Powerful Media Mogul Really Thinks Paul R. LaMonica
  70. What is the Dark Web?: The truth about the hidden part of the internet
    What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  71. The Greatest Athlete (You've Never Heard Of)
    The Greatest Athlete (You've Never Heard Of) Mark Hebscher
  72. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
    A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  73. Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science
    Preventing the Next Pandemic: Vaccine Diplomacy in a Time of Anti-science Peter J. Hotez
  74. The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age
    The Blue Revolution: Hunting, Harvesting, and Farming Seafood in the Information Age Nicholas Sullivan
  75. The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity
    The Tyranny of Dead Ideas: Revolutionary Thinking for a New Age of Prosperity Matt Miller
  76. No Higher Power: Obama’s War on Religious Freedom
    No Higher Power: Obama’s War on Religious Freedom Phyllis Schlafly
  77. Contraception: A Concise History
    Contraception: A Concise History Donna J. Drucker
  78. Ancient Brews: Rediscovered and Re-created
    Ancient Brews: Rediscovered and Re-created Patrick E. McGovern
  79. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
    The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
  80. Football Is a Numbers Game: Pro Football Focus and How a Data-Driven Approach Shook Up the Sport
    Football Is a Numbers Game: Pro Football Focus and How a Data-Driven Approach Shook Up the Sport Matthew Coller
  81. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
    RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
  82. The Price of Fortune: The Untold Story of Being James Packer
    The Price of Fortune: The Untold Story of Being James Packer Damon Kitney
  83. The CIA: The History and Legacy of the Central Intelligence Agency
    The CIA: The History and Legacy of the Central Intelligence Agency Charles River Editors
  84. The Case Against the New Censorship: Protecting Free Speech from Big Tech, Progressives, and Universities
    The Case Against the New Censorship: Protecting Free Speech from Big Tech, Progressives, and Universities Alan M. Dershowitz
  85. The Problem of Democracy: America, the Middle East, and the Rise and Fall of an Idea
    The Problem of Democracy: America, the Middle East, and the Rise and Fall of an Idea Shadi Hamid
  86. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
    CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
  87. Seconds to Live or Die: Life-Saving Lessons from a Former CIA Officer
    Seconds to Live or Die: Life-Saving Lessons from a Former CIA Officer Robert Montgomery
  88. Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval
    Yellen: The Trailblazing Economist Who Navigated an Era of Upheaval Jon Hilsenrath
  89. Money Games: The Inside Story of How American Dealmakers Saved Korea's Most Iconic Bank
    Money Games: The Inside Story of How American Dealmakers Saved Korea's Most Iconic Bank Weijian Shan
  90. Churchill's Trial: Winston Churchill and the Salvation of Free Government
    Churchill's Trial: Winston Churchill and the Salvation of Free Government Dr. Larry Arnn
  91. Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English
    Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English Donald B. Grey

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

159 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis